SlideShare a Scribd company logo
1 of 45
LOGICAL ADDRESSING
LOGICAL ADDRESSING IPv4 Addresses
Slide 2Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
An IPv4 address is a 32-bit address that uniquely and universally defines
the connection of a device (for example, a computer or a router) to the
Internet.
IPv4 ADDRESSES Address Space
Slide 3Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.1
Dotted-decimal notation and binary notation for an IPv4 address
Slide 4Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Example 19.1
Slide 5Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Change the following IPv4 addresses from binary notation to dotted-
decimal notation.
a. 10000001 00001011 00001011 11101111
b. 11000001 10000011 00011011 11111111
We replace each group of 8 bits with its equivalent decimal number
and add dots for separation.
a. 129.11.11.239
b. 193.131.27.255
Example 19.2
Slide 6Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Change the following IPv4 addresses from dotted-decimal notation to
binary notation.
a. 111.56.45.78
b. 221.34.7.82
We replace each decimal number with its binary equivalent.
a. 01101111 00111000 00101101 01001110
b. 11011101 00100010 00000111 01010010
Example 19.3
Slide 7Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Find the error, if any, in the following IPv4 addresses.
a. 111.56.045.78 c. 75.45.301.14
b. 221.34.7.8.20 d. 11100010.23.14.67
a. There must be no leading zero (045).
b. There can be no more than four numbers.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal notation is not
allowed.
IPv4 ADDRESSES Classful Addressing
Slide 8Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.2 Finding the classes in binary and dotted-decimal notation
Slide 9Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Example 19.3
Slide 10Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Find the class of each address.
a. 00000001 00001011 00001011 11101111 c. 14.23.120.8
b. 11000001 10000011 00011011 11111111 d. 252.5.16.111
a. There must be no leading zero (045).
b. There can be no more than four numbers.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal notation is not
allowed.
Table 19.1 Number of blocks and block size in classful IPv4 addressing
Slide 11Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classful Addressing Transmission Control
Slide 12Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Table 19.2 Default masks for classful addressing
Slide 13Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classful Addressing Address Depletion
Slide 14Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classful Addressing Example 19.5
Slide 15Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.3 shows a block of addresses, in both binary and dotted-decimal
notation, granted to a small business that needs 16 addresses.
We can see that the restrictions are applied to this block. The
addresses are contiguous. The number of addresses is a power of 2
(16 = 24), and the first address is divisible by 16. The first address,
when converted to a decimal number, is 3,440,387,360, which when
divided by 16 results in 215,024,210.
Figure 19.3 A block of 16 addresses granted to a small organization
Slide 16Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing Mask
Slide 17Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing First Address
Slide 18Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing: First Address Example 19.6
Slide 19Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
A block of addresses is granted to a small organization. We know that one
of the addresses is 205.16.37.39/28. What is the first address in the block?
The binary representation of the given address is 11001101
00010000 00100101 00100111. If we set 32−28 rightmost bits to 0,
we get 11001101 00010000 00100101 00100000 or 205.16.37.32.
This is actually the block shown in Figure 19.3.
Classless Addressing Last Address
Slide 20Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing: Last Address Example 19.7
Slide 21Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Find the last address for the block in Example 19.6.
The binary representation of the given address is 11001101
00010000 00100101 00100111. If we set 32 − 28 rightmost bits to
1, we get 11001101 00010000 00100101 00101111 or
205.16.37.47.
This is actually the block shown in Figure 19.3.
Classless Addressing Number of Addresses
Slide 22Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing: Number of Addresses Example 19.8
Slide 23Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Find the number of addresses in Example 19.6.
The value of n is 28, which means that number of addresses is 232−28
or 16.
Classless Addressing: Number of Addresses Example 19.9
Slide 24Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Another way to find the first address, the last address, and the number of
addresses is to represent the mask as a 32-bit binary (or 8-digit
hexadecimal) number. This is particularly useful when we are writing a
program to find these pieces of information. In Example 19.5 the /28 can
be represented as 11111111 11111111 11111111 11110000 (twenty-
eight 1s and four 0s). Find
a. The first address
b. The last address
c. The number of addresses.
Classless Addressing: Number of Addresses Example 19.9
Slide 25Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
a. The first address can be found by ANDing the given addresses
with the mask. ANDing here is done bit by bit. The result of ANDing
2 bits is 1 if both bits are 1s; the result is 0 otherwise.
Address: 11001101 00010000 00100101 00100111
Mask: 11111111 11111111 11111111 11110000
First Address: 11001101 00010000 00100101 00100000
Classless Addressing: Number of Addresses Example 19.9
Slide 26Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
b. The last address can be found by ORing the given addresses with
the complement of the mask. ORing here is done bit by bit. The
result of ORing 2 bits is 0 if both bits are 0s; the result is 1
otherwise. The complement of a number is found by changing each
1 to 0 and each 0 to 1.
Address: 11001101 00010000 00100101 00100111
Mask: 00000000 00000000 00000000 00001111
First Address: 11001101 00010000 00100101 00101111
Classless Addressing: Number of Addresses Example 19.9
Slide 27Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
c. The number of addresses can be found by complementing the
mask, interpreting it as a decimal number, and adding 1 to it.
Mask complement: 00000000 00000000 00000000 00001111
Number of addresses: 15 + 1 = 16
Figure 19.4 A network configuration for the block 205.16.37.32/28
Slide 28Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing Network Address
Slide 29Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure Hierarchy in a telephone network in Agartala
Slide 30Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
381 234 2330
Figure 19.6 Two levels of hierarchy in an IPv4 address
Slide 31Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Two levels of hierarchy: No Subnetting
Slide 32Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.7 Configuration and addresses in a subnetted network
Slide 33Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.8 Three-level hierarchy in an IPv4 address
Slide 34Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Classless Addressing: Address Allocation Example 19.10
Slide 35Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
An ISP is granted a block of addresses starting with 190.100.0.0/16
(65,536 addresses). The ISP needs to distribute these addresses to three
groups of customers as follows:
a. The first group has 64 customers; each needs 256 addresses.
b. The second group has 128 customers; each needs 128 addresses.
c. The third group has 128 customers; each needs 64 addresses.
Design the subblocks and find out how many addresses are still available
after these allocations.
Classless Addressing: Address Allocation Example 19.10
Slide 36Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.9 shows the situation.
Group 1
For this group, each customer needs 256 addresses. This means that
8(log2 256) bits are needed to define each host. The prefix length is then
32 − 8 = 24. The addresses are
1st Customer: 190.100.0.0/24 190.100.0.255/24
2nd Customer: 190.100.1.0/24 190.100.1.255/24
···
64th Customer: 190.100.63.0/24 190.100.63.255/24
Total = 64 x 256 = 16,384
Classless Addressing: Address Allocation Example 19.10
Slide 37Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Group2
For this group, each customer needs 128 addresses. This means that
7(log2 128) bits are needed to define each host. The prefix length is then
32 − 7 = 25. The addresses are
1st Customer: 190.100.64.0/25 190.100.64.127/25
2nd Customer: 190.100.64.128/25 190.100.64.255/25
···
128th Customer: 190.100.127.128/25 190.100.127.255/25
Total = 128 x 128 = 16,384
Classless Addressing: Address Allocation Example 19.10
Slide 38Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Group 3
For this group, each customer needs 64 addresses. This means that
6(log2 64) bits are needed to define each host. The prefix length is then
32 − 6 = 26. The addresses are
1st Customer: 190.100.128.0/26 190.100.128.63/26
2nd Customer: 190.100.128.64/26 190.100.128.127/26
···
64th Customer: 190.100.159.192/26 190.100.159.255/26
Total = 128 x 64 = 8192
Number of granted addresses to the ISP: 65,536
Number of allocated addresses by the ISP: 40,960
Number of available addresses: 24 576
Figure 19.9
An example of address allocation and distribution by an ISP
Slide 39Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Table 19.3 Addresses for private networks
Slide 40Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.10 A NAT implementation
Slide 41Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.11 Addresses in a NAT
Slide 42Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.12 NAT address translation
Slide 43Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Table 19.4 Five-column translation table
Slide 44Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT
Figure 19.13 An ISP and NAT
Slide 45Presented by Pankaj Debbarma, Asstt. Prof.
Deptt. of Computer Science & Engineering, TIT

More Related Content

What's hot (20)

Ethernet
EthernetEthernet
Ethernet
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
Data and signals
Data and signalsData and signals
Data and signals
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
C n practical file
C n practical fileC n practical file
C n practical file
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
logical addressing
logical addressinglogical addressing
logical addressing
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Chapter 3: Data & Signals
Chapter 3: Data & SignalsChapter 3: Data & Signals
Chapter 3: Data & Signals
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 

Similar to NETWORK LAYER - Logical Addressing

20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_AddressingAhmar Hashmi
 
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSubnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSovonesh Pal
 
network Addressing
network Addressingnetwork Addressing
network AddressingTauseef khan
 
Ch19 network layer-logical add
Ch19 network layer-logical addCh19 network layer-logical add
Ch19 network layer-logical addMohammed Romi
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressingkavish dani
 
IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptxnaseerahmad707715
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyKashif Sohail
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptxlaiba29012
 
Subnetting in network layer in computer networks
Subnetting in network layer in computer networksSubnetting in network layer in computer networks
Subnetting in network layer in computer networkskarthiktyagi2
 
class 10_internetworking.ppt
class 10_internetworking.pptclass 10_internetworking.ppt
class 10_internetworking.pptprashant554034
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxssuserc1e786
 

Similar to NETWORK LAYER - Logical Addressing (20)

Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Ch19
Ch19Ch19
Ch19
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
ch19new.ppt
ch19new.pptch19new.ppt
ch19new.ppt
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
Chapter 19: Logical Addressing
Chapter 19: Logical AddressingChapter 19: Logical Addressing
Chapter 19: Logical Addressing
 
Ch19
Ch19Ch19
Ch19
 
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree BhadraSubnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
Subnet Masking in Computer Network--CST 2nd year by Tanushree Bhadra
 
Ch19
Ch19Ch19
Ch19
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
ch19 (1).ppt
ch19 (1).pptch19 (1).ppt
ch19 (1).ppt
 
Ch19 network layer-logical add
Ch19 network layer-logical addCh19 network layer-logical add
Ch19 network layer-logical add
 
4a logical laddressing
4a logical laddressing4a logical laddressing
4a logical laddressing
 
IP addressing and subnetting.pptx
IP addressing and subnetting.pptxIP addressing and subnetting.pptx
IP addressing and subnetting.pptx
 
Pjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasyPjsmith ip addressing & subnetting madeeasy
Pjsmith ip addressing & subnetting madeeasy
 
Network_layer_addressing.pptx
Network_layer_addressing.pptxNetwork_layer_addressing.pptx
Network_layer_addressing.pptx
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
Subnetting in network layer in computer networks
Subnetting in network layer in computer networksSubnetting in network layer in computer networks
Subnetting in network layer in computer networks
 
class 10_internetworking.ppt
class 10_internetworking.pptclass 10_internetworking.ppt
class 10_internetworking.ppt
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptx
 

More from Pankaj Debbarma

OS-01 Virtual Memory.pptx
OS-01 Virtual Memory.pptxOS-01 Virtual Memory.pptx
OS-01 Virtual Memory.pptxPankaj Debbarma
 
AI-06 Search Techniques - Informed.pptx
AI-06 Search Techniques - Informed.pptxAI-06 Search Techniques - Informed.pptx
AI-06 Search Techniques - Informed.pptxPankaj Debbarma
 
AI-05 Search Algorithms.pptx
AI-05 Search Algorithms.pptxAI-05 Search Algorithms.pptx
AI-05 Search Algorithms.pptxPankaj Debbarma
 
CP03-Data Structures.pptx
CP03-Data Structures.pptxCP03-Data Structures.pptx
CP03-Data Structures.pptxPankaj Debbarma
 
AI-04 Production System - Search Problem.pptx
AI-04 Production System - Search Problem.pptxAI-04 Production System - Search Problem.pptx
AI-04 Production System - Search Problem.pptxPankaj Debbarma
 
AI-03 Problems State Space.pptx
AI-03 Problems State Space.pptxAI-03 Problems State Space.pptx
AI-03 Problems State Space.pptxPankaj Debbarma
 
CP02-Structure and Union.pptx
CP02-Structure and Union.pptxCP02-Structure and Union.pptx
CP02-Structure and Union.pptxPankaj Debbarma
 
Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06Pankaj Debbarma
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPPankaj Debbarma
 

More from Pankaj Debbarma (17)

AI-09 Logic in AI
AI-09 Logic in AIAI-09 Logic in AI
AI-09 Logic in AI
 
OS-02 Segmentation.pptx
OS-02 Segmentation.pptxOS-02 Segmentation.pptx
OS-02 Segmentation.pptx
 
AI-08 Game Playing.pptx
AI-08 Game Playing.pptxAI-08 Game Playing.pptx
AI-08 Game Playing.pptx
 
OS-01 Virtual Memory.pptx
OS-01 Virtual Memory.pptxOS-01 Virtual Memory.pptx
OS-01 Virtual Memory.pptx
 
AI-06 Search Techniques - Informed.pptx
AI-06 Search Techniques - Informed.pptxAI-06 Search Techniques - Informed.pptx
AI-06 Search Techniques - Informed.pptx
 
AI-05 Search Algorithms.pptx
AI-05 Search Algorithms.pptxAI-05 Search Algorithms.pptx
AI-05 Search Algorithms.pptx
 
CP03-Data Structures.pptx
CP03-Data Structures.pptxCP03-Data Structures.pptx
CP03-Data Structures.pptx
 
AI-04 Production System - Search Problem.pptx
AI-04 Production System - Search Problem.pptxAI-04 Production System - Search Problem.pptx
AI-04 Production System - Search Problem.pptx
 
AI-03 Problems State Space.pptx
AI-03 Problems State Space.pptxAI-03 Problems State Space.pptx
AI-03 Problems State Space.pptx
 
CP02-Structure and Union.pptx
CP02-Structure and Union.pptxCP02-Structure and Union.pptx
CP02-Structure and Union.pptx
 
Intelligent Agents
Intelligent AgentsIntelligent Agents
Intelligent Agents
 
CP01.pptx
CP01.pptxCP01.pptx
CP01.pptx
 
Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06Computer Graphics & Visualization - 06
Computer Graphics & Visualization - 06
 
HTTP and Email
HTTP and EmailHTTP and Email
HTTP and Email
 
Ppt World Wide Web
Ppt World Wide WebPpt World Wide Web
Ppt World Wide Web
 
Ppt congestion control
Ppt congestion controlPpt congestion control
Ppt congestion control
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

NETWORK LAYER - Logical Addressing

  • 2. LOGICAL ADDRESSING IPv4 Addresses Slide 2Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT An IPv4 address is a 32-bit address that uniquely and universally defines the connection of a device (for example, a computer or a router) to the Internet.
  • 3. IPv4 ADDRESSES Address Space Slide 3Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 4. Figure 19.1 Dotted-decimal notation and binary notation for an IPv4 address Slide 4Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 5. Example 19.1 Slide 5Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Change the following IPv4 addresses from binary notation to dotted- decimal notation. a. 10000001 00001011 00001011 11101111 b. 11000001 10000011 00011011 11111111 We replace each group of 8 bits with its equivalent decimal number and add dots for separation. a. 129.11.11.239 b. 193.131.27.255
  • 6. Example 19.2 Slide 6Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Change the following IPv4 addresses from dotted-decimal notation to binary notation. a. 111.56.45.78 b. 221.34.7.82 We replace each decimal number with its binary equivalent. a. 01101111 00111000 00101101 01001110 b. 11011101 00100010 00000111 01010010
  • 7. Example 19.3 Slide 7Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Find the error, if any, in the following IPv4 addresses. a. 111.56.045.78 c. 75.45.301.14 b. 221.34.7.8.20 d. 11100010.23.14.67 a. There must be no leading zero (045). b. There can be no more than four numbers. c. Each number needs to be less than or equal to 255. d. A mixture of binary notation and dotted-decimal notation is not allowed.
  • 8. IPv4 ADDRESSES Classful Addressing Slide 8Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 9. Figure 19.2 Finding the classes in binary and dotted-decimal notation Slide 9Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 10. Example 19.3 Slide 10Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Find the class of each address. a. 00000001 00001011 00001011 11101111 c. 14.23.120.8 b. 11000001 10000011 00011011 11111111 d. 252.5.16.111 a. There must be no leading zero (045). b. There can be no more than four numbers. c. Each number needs to be less than or equal to 255. d. A mixture of binary notation and dotted-decimal notation is not allowed.
  • 11. Table 19.1 Number of blocks and block size in classful IPv4 addressing Slide 11Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 12. Classful Addressing Transmission Control Slide 12Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 13. Table 19.2 Default masks for classful addressing Slide 13Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 14. Classful Addressing Address Depletion Slide 14Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 15. Classful Addressing Example 19.5 Slide 15Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Figure 19.3 shows a block of addresses, in both binary and dotted-decimal notation, granted to a small business that needs 16 addresses. We can see that the restrictions are applied to this block. The addresses are contiguous. The number of addresses is a power of 2 (16 = 24), and the first address is divisible by 16. The first address, when converted to a decimal number, is 3,440,387,360, which when divided by 16 results in 215,024,210.
  • 16. Figure 19.3 A block of 16 addresses granted to a small organization Slide 16Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 17. Classless Addressing Mask Slide 17Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 18. Classless Addressing First Address Slide 18Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 19. Classless Addressing: First Address Example 19.6 Slide 19Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT A block of addresses is granted to a small organization. We know that one of the addresses is 205.16.37.39/28. What is the first address in the block? The binary representation of the given address is 11001101 00010000 00100101 00100111. If we set 32−28 rightmost bits to 0, we get 11001101 00010000 00100101 00100000 or 205.16.37.32. This is actually the block shown in Figure 19.3.
  • 20. Classless Addressing Last Address Slide 20Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 21. Classless Addressing: Last Address Example 19.7 Slide 21Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Find the last address for the block in Example 19.6. The binary representation of the given address is 11001101 00010000 00100101 00100111. If we set 32 − 28 rightmost bits to 1, we get 11001101 00010000 00100101 00101111 or 205.16.37.47. This is actually the block shown in Figure 19.3.
  • 22. Classless Addressing Number of Addresses Slide 22Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 23. Classless Addressing: Number of Addresses Example 19.8 Slide 23Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Find the number of addresses in Example 19.6. The value of n is 28, which means that number of addresses is 232−28 or 16.
  • 24. Classless Addressing: Number of Addresses Example 19.9 Slide 24Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Another way to find the first address, the last address, and the number of addresses is to represent the mask as a 32-bit binary (or 8-digit hexadecimal) number. This is particularly useful when we are writing a program to find these pieces of information. In Example 19.5 the /28 can be represented as 11111111 11111111 11111111 11110000 (twenty- eight 1s and four 0s). Find a. The first address b. The last address c. The number of addresses.
  • 25. Classless Addressing: Number of Addresses Example 19.9 Slide 25Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT a. The first address can be found by ANDing the given addresses with the mask. ANDing here is done bit by bit. The result of ANDing 2 bits is 1 if both bits are 1s; the result is 0 otherwise. Address: 11001101 00010000 00100101 00100111 Mask: 11111111 11111111 11111111 11110000 First Address: 11001101 00010000 00100101 00100000
  • 26. Classless Addressing: Number of Addresses Example 19.9 Slide 26Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT b. The last address can be found by ORing the given addresses with the complement of the mask. ORing here is done bit by bit. The result of ORing 2 bits is 0 if both bits are 0s; the result is 1 otherwise. The complement of a number is found by changing each 1 to 0 and each 0 to 1. Address: 11001101 00010000 00100101 00100111 Mask: 00000000 00000000 00000000 00001111 First Address: 11001101 00010000 00100101 00101111
  • 27. Classless Addressing: Number of Addresses Example 19.9 Slide 27Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT c. The number of addresses can be found by complementing the mask, interpreting it as a decimal number, and adding 1 to it. Mask complement: 00000000 00000000 00000000 00001111 Number of addresses: 15 + 1 = 16
  • 28. Figure 19.4 A network configuration for the block 205.16.37.32/28 Slide 28Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 29. Classless Addressing Network Address Slide 29Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 30. Figure Hierarchy in a telephone network in Agartala Slide 30Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT 381 234 2330
  • 31. Figure 19.6 Two levels of hierarchy in an IPv4 address Slide 31Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 32. Two levels of hierarchy: No Subnetting Slide 32Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 33. Figure 19.7 Configuration and addresses in a subnetted network Slide 33Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 34. Figure 19.8 Three-level hierarchy in an IPv4 address Slide 34Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 35. Classless Addressing: Address Allocation Example 19.10 Slide 35Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT An ISP is granted a block of addresses starting with 190.100.0.0/16 (65,536 addresses). The ISP needs to distribute these addresses to three groups of customers as follows: a. The first group has 64 customers; each needs 256 addresses. b. The second group has 128 customers; each needs 128 addresses. c. The third group has 128 customers; each needs 64 addresses. Design the subblocks and find out how many addresses are still available after these allocations.
  • 36. Classless Addressing: Address Allocation Example 19.10 Slide 36Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Figure 19.9 shows the situation. Group 1 For this group, each customer needs 256 addresses. This means that 8(log2 256) bits are needed to define each host. The prefix length is then 32 − 8 = 24. The addresses are 1st Customer: 190.100.0.0/24 190.100.0.255/24 2nd Customer: 190.100.1.0/24 190.100.1.255/24 ··· 64th Customer: 190.100.63.0/24 190.100.63.255/24 Total = 64 x 256 = 16,384
  • 37. Classless Addressing: Address Allocation Example 19.10 Slide 37Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Group2 For this group, each customer needs 128 addresses. This means that 7(log2 128) bits are needed to define each host. The prefix length is then 32 − 7 = 25. The addresses are 1st Customer: 190.100.64.0/25 190.100.64.127/25 2nd Customer: 190.100.64.128/25 190.100.64.255/25 ··· 128th Customer: 190.100.127.128/25 190.100.127.255/25 Total = 128 x 128 = 16,384
  • 38. Classless Addressing: Address Allocation Example 19.10 Slide 38Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT Group 3 For this group, each customer needs 64 addresses. This means that 6(log2 64) bits are needed to define each host. The prefix length is then 32 − 6 = 26. The addresses are 1st Customer: 190.100.128.0/26 190.100.128.63/26 2nd Customer: 190.100.128.64/26 190.100.128.127/26 ··· 64th Customer: 190.100.159.192/26 190.100.159.255/26 Total = 128 x 64 = 8192 Number of granted addresses to the ISP: 65,536 Number of allocated addresses by the ISP: 40,960 Number of available addresses: 24 576
  • 39. Figure 19.9 An example of address allocation and distribution by an ISP Slide 39Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 40. Table 19.3 Addresses for private networks Slide 40Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 41. Figure 19.10 A NAT implementation Slide 41Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 42. Figure 19.11 Addresses in a NAT Slide 42Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 43. Figure 19.12 NAT address translation Slide 43Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 44. Table 19.4 Five-column translation table Slide 44Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT
  • 45. Figure 19.13 An ISP and NAT Slide 45Presented by Pankaj Debbarma, Asstt. Prof. Deptt. of Computer Science & Engineering, TIT